US9100384B2 - Method and apparatus for accessing heterogeneous networks via wireless local area network - Google Patents

Method and apparatus for accessing heterogeneous networks via wireless local area network Download PDF

Info

Publication number
US9100384B2
US9100384B2 US12/730,903 US73090310A US9100384B2 US 9100384 B2 US9100384 B2 US 9100384B2 US 73090310 A US73090310 A US 73090310A US 9100384 B2 US9100384 B2 US 9100384B2
Authority
US
United States
Prior art keywords
authentication
terminal
server
serving gateway
target network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active, expires
Application number
US12/730,903
Other versions
US20100251331A1 (en
Inventor
Guodong Li
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Assigned to HUAWEI TECHNOLOGIES CO., LTD. reassignment HUAWEI TECHNOLOGIES CO., LTD. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: LI, GUODONG
Publication of US20100251331A1 publication Critical patent/US20100251331A1/en
Application granted granted Critical
Publication of US9100384B2 publication Critical patent/US9100384B2/en
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/08Protocols for interworking; Protocol conversion
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • H04W8/06Registration at serving network Location Register, VLR or user mobility server
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Definitions

  • the present invention relates to communications technologies, and in particular, to a method and an apparatus for accessing heterogeneous networks via a wireless local area network.
  • WLAN Wireless Local Area Network
  • the convergence of communication services and the customer-compliance-oriented operation mode need supports from the network convergence technology.
  • the WLAN has the potential of being a supplement to the data networks.
  • a solution to operating multiple data networks may be implemented by accessing via the WLAN. This solution can solve the problem of limited spectrum resources of multiple data networks.
  • multiple terminals that access the WLAN can access multiple data networks via the WLAN. In this way, the WLAN can share the coverage of the other data networks, thus saving network coverage costs.
  • the prior art has the following problem. Terminals that access the WLAN are unable to access multiple data networks.
  • Embodiments of the present invention provide a method and an apparatus for accessing heterogeneous networks via a WLAN, so that the terminal that accesses the WLAN can access multiple data networks.
  • the method for accessing heterogeneous networks via the WLAN may be implemented by the following technical solution.
  • An access request is received from a terminal or a portal/policy server.
  • a target network that the terminal needs to access is determined according to the access request.
  • the access request is converted according to the format of the target network transmission protocol.
  • the converted access request is sent to the target network.
  • An authentication result is received from the target network, and the authentication result is sent to the terminal.
  • An authentication serving gateway provided in an embodiment of the present invention includes a request receiving unit that is adapted to receive an access request from a terminal or a portal/policy server.
  • a target network determining unit is adapted to determine a target network that the terminal needs to access according to the access request.
  • a request converting unit is adapted to convert the access request according to the format of the target network transmission protocol.
  • a request sending unit is adapted to send the converted access request to the target network.
  • An authentication result receiving unit is adapted to receive an authentication result from the target network.
  • An authentication result sending unit is adapted to send the authentication result to the terminal.
  • a portal/policy server provided in an embodiment of the present invention includes an access request receiving unit adapted to receive an access request from a terminal.
  • a login page sending unit is adapted to send an authentication login page to the terminal after receiving the access request.
  • a login information receiving unit is adapted to receive authentication login information from the terminal.
  • An access request sending unit is adapted to determine an access policy according to the authentication login information and send an access request that carries the access policy to the authentication serving gateway.
  • the target network that the terminal needs to access is determined according to the access request sent from a WLAN terminal; and an access request that complies with the format of the target network transmission protocol is sent to the target network, so that the WLAN terminal can access multiple data networks.
  • FIG. 1 is a flowchart of a method in an embodiment of the present invention
  • FIG. 2 is a flowchart of another method in an embodiment of the present invention.
  • FIG. 3 shows a schematic diagram of an authentication serving gateway in an embodiment of the present invention
  • FIG. 4 shows a schematic diagram of another authentication serving gateway in an embodiment of the present invention.
  • FIG. 5 shows a schematic diagram of the authentication serving gateway with charging functions in an embodiment of the present invention
  • FIG. 6 shows a schematic diagram of another authentication serving gateway in an embodiment of the present invention.
  • FIG. 7 shows a schematic diagram of the authentication serving gateway with a monitoring unit in an embodiment of the present invention
  • FIG. 8 shows a schematic diagram of a portal/policy server in an embodiment of the present invention.
  • FIG. 9 shows a schematic diagram of another portal/policy server in the third embodiment of the present invention.
  • FIG. 10 shows a schematic diagram of a system in an embodiment of the present invention.
  • FIG. 11 shows another schematic diagram of the system in an embodiment of the present invention.
  • Embodiments of the present invention provide a method, an apparatus, and a system for accessing heterogeneous networks via a WLAN, so that the terminal that accesses the WLAN can access multiple data networks.
  • the method for accessing heterogeneous networks via the WLAN in the first embodiment includes the following steps.
  • Step 101 Receive an access request from a terminal or a portal/policy server.
  • the access request may include the information about the target network that the terminal needs to access.
  • the information may be directly indicated in the access request.
  • the information also may be implied in the access request, for example, the home operator and supporting network may be determined according to the number of the terminal.
  • Step 102 Determine a target network that the terminal needs to access according to the access request.
  • Step 103 Convert the access request according to the format of the target network transmission protocol.
  • Step 104 Send the converted access request to the target network.
  • Step 105 Receive an authentication result from the target network.
  • Step 106 Send the authentication result to the terminal.
  • the entities that execute the preceding steps may be various devices that implement authentication conversion for accessing via WLAN, for example, an added authentication serving gateway or devices that integrate a function which can execute the preceding steps.
  • the target network that the terminal needs to access is determined according to the access request sent from the terminal; and the access request being transformed to comply with the format of the target network transmission protocol is sent to the target network, so that the WLAN terminal can access multiple data networks.
  • the heterogeneous networks may be data networks different from the WLAN.
  • the data networks different from the WLAN are various. Because these networks are usually based on different protocols or architecture, they are called heterogeneous networks in the embodiments of the present invention.
  • the target network that the terminal needs to access is determined according to the access request sent from the terminal; and the access request being transformed to comply with the format of the target network transmission protocol is sent to the target network, so that the WLAN terminal accesses multiple data networks.
  • This solution does not require modification to a terminal and therefore is easy to implement.
  • the following steps may further be performed:
  • the step 102 of determining a target network that the terminal needs to access according to the access request may be as follows:
  • step 105 After receiving the authentication result from the target network in step 105 , the following steps may be performed:
  • BOSS Business Operation Support System
  • the policies for accessing heterogeneous networks are uniformly managed by the portal/policy server, thus simplifying the authentication serving gateway and facilitating the management of the heterogeneous network information.
  • the unified authentication or unified charging of the WLAN and multiple networks may promote the convergence of these networks.
  • the service policy information may be further sent to the terminal.
  • the following steps may be performed:
  • the user is informed of the terminal service policy information, which makes the user's right to know the services the user used come true and lays a foundation for changing the service policy. Whether a heartbeat times out is monitored. If it is detected that the heartbeat times out, the terminal that is connected but is idle may be disconnected, thus saving access resources.
  • the authentication serving gateway and portal/policy server are configured to implement authentication conversion for WLAN access.
  • the following WLAN takes the Wireless Fidelity (WiFi) of the Institute of Electrical and Electronics Engineers (IEEE) 802.11b standard as an example.
  • the WiFi terminal may establish a communication connection with the authentication serving gateway through an Access Point (AP).
  • a Home Subscriber Server may also be configured to implement authentication conversion.
  • the target network may include an Authentication, Authorization and Accounting (AAA) server, a billing system or BOSS, and a Home Location Register (HLR).
  • AAA Authentication, Authorization and Accounting
  • BOSS billing system
  • HLR Home Location Register
  • Step 201 The WiFi terminal discovers the network, and enters the WiFi coverage area to access a local area network.
  • a Dynamic Host Configuration Protocol (DHCP) server may allocate an IP address to the WiFi terminal.
  • the IP address may be used as the communication address between the WiFi terminal and the local area network.
  • DHCP Dynamic Host Configuration Protocol
  • Step 202 The WiFi terminal executes the login process.
  • the WiFi terminal sends an access request to the authentication serving gateway.
  • the WiFi terminal opens the browser and enters any Internet address to connect to the Internet.
  • the authentication serving gateway redirects the request (the redirection may be routing redirection). That is, the authentication serving gateway changes the accessed Internet address to the authentication page address of a portal/policy server, where the portal/policy server may be a portal server or a policy server.
  • the portal/policy server feeds back an authentication login page to the WiFi terminal.
  • the preceding authentication login page may be a Web portal page.
  • Step 203 The WiFi terminal receives authentication login information entered on the Web authentication login page, where the authentication login information may be the user name and password, and then sends the authentication login information to the portal/policy server.
  • Step 204 The portal/policy server sends an access request to the authentication serving gateway.
  • the portal/policy server may store IDs of various types of user names and corresponding operator information.
  • the portal/policy server may determine policies such as the access policy, authentication policy, and charging policy of the terminal.
  • the access policy may be carried in the preceding access request that the portal/policy server sends to the authentication serving gateway.
  • Step 205 The authentication serving gateway determines a target network that the terminal needs to authenticate or charge according to the access request.
  • the condition for determining a target network that the terminal needs to authenticate or charge may be obtained from an HSS.
  • the authentication serving gateway converts the user authentication login information into a standard access request that meets the format of the target network.
  • the standard access request may be converted according to the format of the target network transmission protocol.
  • Step 206 The authentication serving gateway sends the converted standard user access request to the target network to start the user access authentication process. After the target network is authenticated, the authentication serving gateway receives an authentication result from the target network.
  • Step 207 The authentication serving gateway sends the authentication result to the portal/policy server. If the authentication succeeds, the portal/policy server may send the service policy information of the user to the authentication serving gateway.
  • the service policy may include information such as types of services that the user subscribes to.
  • the portal/policy server may also send the access policy of the WiFi terminal to the authentication serving gateway and the WiFi terminal. If the WiFi and a Global System for Mobile Communications (GSM) are available at the same time, the terminal may select a proper access mode. For example, it uses the WiFi first to establish voice communication services, thus saving toll fees.
  • GSM Global System for Mobile Communications
  • the user may send a change request for changing the required service or a query request for querying for the services subscribed by the user to the portal/policy server on the Web portal page.
  • the portal/policy server may send the service information subscribed by the user to the WiFi terminal according to the query request or change the services subscribed to by the user according to the change request.
  • Step 208 The WiFi terminal accepts communications of normal services.
  • the terminal may always interact with the target network through the authentication serving gateway, and the authentication serving gateway may collect the user service information.
  • Step 209 The authentication serving gateway monitors whether the terminal logs out.
  • the monitoring method may be: The authentication serving gateway monitors whether the heartbeat times out (it may periodically check whether the data link is still in the activated state; if no response is made after the preset time ends, the heartbeat times out.) or whether a logout request is received from the WiFi terminal; if it is detected that the heartbeat times out or a logout message is received from the terminal, the process goes to step 211 .
  • Step 210 The authentication serving gateway sends the obtained charging information to the target network.
  • the target network may charge the WiFi terminal according to the obtained charging information, and send the obtained charging information to the local charging system and the home charging system of the user.
  • the local operator network and home operator network allocate fees and benefits according to a protocol. If the charging information is customized by the BOSS, the authentication serving gateway may send the obtained charging information to the BOSS.
  • Step 211 The authentication serving gateway stops charging and disconnects the Internet (logout process).
  • the authentication serving gateway may act as the access control component of the WLAN, and manage the WLAN session access.
  • the process of sending an authentication page to the terminal by the portal/policy server and returning the login information by the terminal is a user authentication process based on the Web Portal, which may be implemented by using following multiple methods:
  • a one-time login password is used.
  • the user enters a mobile phone number on the Web portal authentication page, and sends the mobile phone number to the portal server.
  • the portal server feeds back a one-time login password through short messages. After the user obtains the password, the user enters the password on the Web portal authentication page for authentication.
  • This method has the following merit: When the user needs network services, the portal server sends a one-time password; this method features high security and is of a post-paid type.
  • Second method The terminal subscribes to and registers with the operator network before accessing the network, and deposits money in the terminal account.
  • This method is of a prepaid type.
  • an authentication serving gateway provided in this embodiment includes:
  • a request receiving unit 301 adapted to receive an access request from a terminal or a portal/policy server;
  • a target network determining unit 302 adapted to determine a target network that the terminal needs to access according to the access request
  • a request converting unit 303 adapted to convert the access request according to the format of the target network transmission protocol
  • a request sending unit 304 adapted to send the converted access request to the target network
  • an authentication result receiving unit 305 adapted to receive the authentication result sent from the target network
  • an authentication result sending unit 306 adapted to send the authentication result to the terminal.
  • the request sending unit 304 is further adapted to send the access request from the terminal received by the request receiving unit 301 to the portal/policy server.
  • the preceding authentication serving gateway may further include:
  • a login page sending unit 401 adapted to send the authentication login page from the portal/policy server to the terminal;
  • a login information sending unit 402 adapted to send the authentication login information from the terminal to the portal/policy server;
  • the request receiving unit 301 adapted to receive an access request from the portal/policy server, where the access request carries an access policy
  • the target network determining unit 302 adapted to determine a target network that the terminal needs to access according to the access policy carried in the access request sent from the portal/policy server.
  • the preceding authentication result sending unit 306 is further adapted to send the authentication result to the portal/policy server.
  • the preceding authentication serving gateway may further include:
  • a service policy receiving unit 501 adapted to receive the service policy information from the portal/policy server after the authentication result sending unit 306 sends the authentication result to the portal/policy server;
  • a charging information obtaining unit 502 adapted to obtain charging information according to the user service information collected base on the service policy information;
  • a charging information sending unit 503 adapted to send the charging information obtained by the charging information obtaining unit 502 to at least one of the following: the BOSS, the target network, and the local charging system.
  • the preceding authentication serving gateway may further include:
  • a service policy sending unit 601 adapted to send the service policy information to the terminal.
  • the preceding authentication serving gateway may further include:
  • a logout monitoring unit 701 adapted to: monitor whether the heartbeat times out and whether a logout message is received from the terminal;
  • an obtaining and connection controlling unit 702 adapted to: stop obtaining the charging information and disconnect the network if the heartbeat times out or a logout message is received from the terminal.
  • the target network that the terminal needs to access is determined according to the access request sent from the WLAN terminal; and an access request that complies with the format of the target network transmission protocol is sent to the target network, so that the WLAN terminal accesses multiple data networks.
  • the policies for accessing heterogeneous networks are uniformly managed by the portal/policy server. In this way, the authentication serving gateway may be simplified and the heterogeneous network information may be managed clearly.
  • the unified authentication or unified charging of the WLAN and multiple networks may promote the convergence of these networks.
  • the user is informed of the terminal service policy information, which reflects the user's right to know the truth and lays a foundation for changing the service policy. If it is detected that the heartbeat times out, the terminal that is connected but is idle may be disconnected, thus saving access resources.
  • the portal/policy server provided in this embodiment includes:
  • an access request receiving unit 801 adapted to receive an access request from the terminal;
  • a login page sending unit 802 adapted to send an authentication login page after receiving the access request
  • a login information receiving unit 803 adapted to receive the authentication login information
  • an access request sending unit 804 adapted to: determine an access policy according to the authentication login information, and send an access request that carries the access policy to the authentication serving gateway.
  • the preceding portal/policy server may further include:
  • an authentication result receiving unit 901 adapted to receive the authentication result from the authentication serving gateway;
  • a service policy sending unit 902 adapted to send the service policy information corresponding to the authentication result to the authentication serving gateway.
  • the policies for accessing heterogeneous networks are uniformly managed by using the portal/policy server.
  • the authentication serving gateway may be simplified and the heterogeneous network information may be managed clearly.
  • the system for accessing heterogeneous networks via the WLAN in this embodiment includes an authentication serving gateway 1001 , a target network 1002 , and a terminal 1003 that are mutually connected.
  • the authentication serving gateway 1001 is adapted to: receive an access request from the terminal 1003 ; determine the target network 1002 that the terminal 1003 needs to access according to the access request; convert the access request according to the format of the transmission protocol required by the target network 1002 ; send the converted access request to the target network 1002 ; receive an authentication result from the target network 1002 , and send the authentication result to the terminal 1003 .
  • the system may further include a portal/policy server 1101 .
  • the authentication serving gateway 1001 is further adapted to receive the access request from the portal/policy server 1101 .
  • the authentication serving gateway 1001 is further adapted to: send the access request from the terminal to the portal/policy server 1101 ; send the authentication login page from the portal/policy server to the terminal 1003 ; send the authentication login information from the terminal 1003 to the portal/policy server 1101 ; receive an access request that carries the access policy from the portal/policy server 1101 ; and determine the target network 1002 that the terminal 1003 needs to access according to the access policy in the access request from the portal/policy server 1101 .
  • the portal/policy server 1101 is adapted to: receive an access request from the terminal 1003 ; send the authentication login page to the authentication serving gateway 1001 after receiving the access request; receive the authentication login information, determine the access policy according to the authentication login information, and send an access request that carries the access policy to the authentication serving gateway 1001 .
  • the preceding authentication serving gateway is further adapted to send the preceding authentication result to the portal/policy server 1101 ; receive the service policy information from the portal/policy server 1101 ; and obtain the charging information according to the user service information collected base on the service policy information, and send the charging information to at least one of the following: the BOSS, the target network 1002 , and the local charging system.
  • the portal/policy server 1101 is further adapted to: receive the authentication result from the authentication serving gateway 1001 , and send the service policy information corresponding to the authentication result to the authentication serving gateway 1001 .
  • the target network that the terminal needs to access is determined according to the access request sent from the WLAN terminal; and an access request that complies with the format of the target network transmission protocol is sent to the target network, so that the WLAN terminal accesses multiple data networks.
  • the policies for accessing heterogeneous networks are managed by using the portal/policy server.
  • the authentication serving gateway may be simplified and the heterogeneous network information may be managed clearly.
  • the unified authentication or unified charging of the WLAN and multiple networks may promote the convergence of these networks.
  • the program may be stored in a computer readable storage medium such as a Random-Access Memory (RAM), a memory, a Read-Only Memory (ROM), an Electrically-Programmable Read-Only Memory (EPROM), an Electrically-Erasable Programmable Read-Only Memory (EEPROM), a register, a hard disk, a removable disk, a Compact Disc-Read Only Memory (CD-ROM), or a storage medium of any forms well-known to persons skilled in the art.
  • RAM Random-Access Memory
  • ROM Read-Only Memory
  • EPROM Electrically-Programmable Read-Only Memory
  • EEPROM Electrically-Erasable Programmable Read-Only Memory
  • register a hard disk, a removable disk, a Compact Disc-Read Only Memory (CD-ROM), or a storage medium of any forms well-known to persons skilled in the art.
  • CD-ROM Compact Disc-Read Only Memory

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A method and an apparatus for accessing heterogeneous networks via a Wireless Local Area Network (WLAN) are disclosed. The method includes receiving an access request from a WLAN terminal or a portal/policy server; determining a target network that the terminal needs to access according to the access request; converting the access request according to the format of a target network transmission protocol; sending the converted access request to the target network; and receiving an authentication result from the target network, and sending the authentication result to the terminal.

Description

This application claims priority to Chinese Patent Application No. 200910119377.8, filed on Mar. 24, 2009, which is hereby incorporated by reference in its entirety.
TECHNICAL FIELD
The present invention relates to communications technologies, and in particular, to a method and an apparatus for accessing heterogeneous networks via a wireless local area network.
BACKGROUND
With the development of communications technologies, wireless and broadband communications have already become an important development trend in the future.
On network systems such as Third Generation Partnership Project (3GPP) and Worldwide Interoperability for Microwave Access (WiMAX) networks, the wireless spectrum resources are limited. Because low spectrums (generally smaller than 2 GHz) are occupied by broadcast, TV, military, or civil networks, the wireless bandwidth moves towards high frequency bands. But, high frequency band technologies may bring about a poor indoor coverage. The Wireless Local Area Network (WLAN) has advantages such as low costs and wide application scope, and can support multiple terminals.
The convergence of communication services and the customer-compliance-oriented operation mode need supports from the network convergence technology. The WLAN has the potential of being a supplement to the data networks. A solution to operating multiple data networks may be implemented by accessing via the WLAN. This solution can solve the problem of limited spectrum resources of multiple data networks. In addition, multiple terminals that access the WLAN can access multiple data networks via the WLAN. In this way, the WLAN can share the coverage of the other data networks, thus saving network coverage costs.
The prior art has the following problem. Terminals that access the WLAN are unable to access multiple data networks.
SUMMARY OF THE INVENTION
Embodiments of the present invention provide a method and an apparatus for accessing heterogeneous networks via a WLAN, so that the terminal that accesses the WLAN can access multiple data networks.
The method for accessing heterogeneous networks via the WLAN may be implemented by the following technical solution. An access request is received from a terminal or a portal/policy server. A target network that the terminal needs to access is determined according to the access request. The access request is converted according to the format of the target network transmission protocol. The converted access request is sent to the target network. An authentication result is received from the target network, and the authentication result is sent to the terminal.
An authentication serving gateway provided in an embodiment of the present invention includes a request receiving unit that is adapted to receive an access request from a terminal or a portal/policy server. A target network determining unit is adapted to determine a target network that the terminal needs to access according to the access request. A request converting unit is adapted to convert the access request according to the format of the target network transmission protocol. A request sending unit is adapted to send the converted access request to the target network. An authentication result receiving unit is adapted to receive an authentication result from the target network. An authentication result sending unit is adapted to send the authentication result to the terminal.
A portal/policy server provided in an embodiment of the present invention includes an access request receiving unit adapted to receive an access request from a terminal. A login page sending unit is adapted to send an authentication login page to the terminal after receiving the access request. A login information receiving unit is adapted to receive authentication login information from the terminal. An access request sending unit is adapted to determine an access policy according to the authentication login information and send an access request that carries the access policy to the authentication serving gateway.
The preceding technical solution has the following benefits. The target network that the terminal needs to access is determined according to the access request sent from a WLAN terminal; and an access request that complies with the format of the target network transmission protocol is sent to the target network, so that the WLAN terminal can access multiple data networks.
BRIEF DESCRIPTION OF THE DRAWINGS
For a more complete understanding of the present invention, and the advantages thereof, reference is now made to the following descriptions taken in conjunction with the accompanying drawings, in which:
FIG. 1 is a flowchart of a method in an embodiment of the present invention;
FIG. 2 is a flowchart of another method in an embodiment of the present invention;
FIG. 3 shows a schematic diagram of an authentication serving gateway in an embodiment of the present invention;
FIG. 4 shows a schematic diagram of another authentication serving gateway in an embodiment of the present invention;
FIG. 5 shows a schematic diagram of the authentication serving gateway with charging functions in an embodiment of the present invention;
FIG. 6 shows a schematic diagram of another authentication serving gateway in an embodiment of the present invention;
FIG. 7 shows a schematic diagram of the authentication serving gateway with a monitoring unit in an embodiment of the present invention;
FIG. 8 shows a schematic diagram of a portal/policy server in an embodiment of the present invention;
FIG. 9 shows a schematic diagram of another portal/policy server in the third embodiment of the present invention;
FIG. 10 shows a schematic diagram of a system in an embodiment of the present invention; and
FIG. 11 shows another schematic diagram of the system in an embodiment of the present invention.
DETAILED DESCRIPTION OF ILLUSTRATIVE EMBODIMENTS
Embodiments of the present invention provide a method, an apparatus, and a system for accessing heterogeneous networks via a WLAN, so that the terminal that accesses the WLAN can access multiple data networks.
First Embodiment
As shown in FIG. 1, the method for accessing heterogeneous networks via the WLAN in the first embodiment includes the following steps.
Step 101: Receive an access request from a terminal or a portal/policy server.
The access request may include the information about the target network that the terminal needs to access. The information may be directly indicated in the access request. The information also may be implied in the access request, for example, the home operator and supporting network may be determined according to the number of the terminal.
Step 102: Determine a target network that the terminal needs to access according to the access request.
Step 103: Convert the access request according to the format of the target network transmission protocol.
Step 104: Send the converted access request to the target network.
Step 105: Receive an authentication result from the target network.
Step 106: Send the authentication result to the terminal.
The entities that execute the preceding steps may be various devices that implement authentication conversion for accessing via WLAN, for example, an added authentication serving gateway or devices that integrate a function which can execute the preceding steps. In this embodiment, the target network that the terminal needs to access is determined according to the access request sent from the terminal; and the access request being transformed to comply with the format of the target network transmission protocol is sent to the target network, so that the WLAN terminal can access multiple data networks.
The heterogeneous networks may be data networks different from the WLAN. The data networks different from the WLAN are various. Because these networks are usually based on different protocols or architecture, they are called heterogeneous networks in the embodiments of the present invention.
In this embodiment, the target network that the terminal needs to access is determined according to the access request sent from the terminal; and the access request being transformed to comply with the format of the target network transmission protocol is sent to the target network, so that the WLAN terminal accesses multiple data networks. This solution does not require modification to a terminal and therefore is easy to implement.
Optionally, after receiving the access request from the terminal in step 101, the following steps may further be performed:
sending the access request to the portal/policy server;
sending an authentication login page from the portal/policy server to the terminal;
sending the authentication login information from the terminal to the portal/policy server; and receiving an access request that carries an access policy from the portal/policy server.
Then, the step 102 of determining a target network that the terminal needs to access according to the access request may be as follows:
determining the target network that the terminal needs to access according to the access policy carried in the access request sent from the portal/policy server.
Further, after receiving the authentication result from the target network in step 105, the following steps may be performed:
sending the authentication result to the portal/policy server;
receiving service policy information from the portal/policy server; and
obtaining the charging information according to the user service information collected based on the service policy information; and then sending the charging information to at least one of the following: a Business Operation Support System (BOSS), the target network, and a local charging system.
In the preceding embodiment, the policies for accessing heterogeneous networks are uniformly managed by the portal/policy server, thus simplifying the authentication serving gateway and facilitating the management of the heterogeneous network information.
In addition, the unified authentication or unified charging of the WLAN and multiple networks may promote the convergence of these networks.
Optionally, after receiving the service policy information from the portal/policy server, the service policy information may be further sent to the terminal.
Optionally, after receiving the service policy information from the portal/policy server, the following steps may be performed:
monitoring whether heartbeat times out or whether a logout message is received from the terminal; and
if the heartbeat times out or a logout message is received from the terminal, stopping obtaining the charging information and disconnecting the network.
In the preceding embodiment, the user is informed of the terminal service policy information, which makes the user's right to know the services the user used come true and lays a foundation for changing the service policy. Whether a heartbeat times out is monitored. If it is detected that the heartbeat times out, the terminal that is connected but is idle may be disconnected, thus saving access resources.
Second Embodiment
For example, in this embodiment, the authentication serving gateway and portal/policy server are configured to implement authentication conversion for WLAN access. The following WLAN takes the Wireless Fidelity (WiFi) of the Institute of Electrical and Electronics Engineers (IEEE) 802.11b standard as an example.
In this embodiment, the WiFi terminal may establish a communication connection with the authentication serving gateway through an Access Point (AP). A Home Subscriber Server (HSS) may also be configured to implement authentication conversion. The target network may include an Authentication, Authorization and Accounting (AAA) server, a billing system or BOSS, and a Home Location Register (HLR).
Step 201: The WiFi terminal discovers the network, and enters the WiFi coverage area to access a local area network. During the process of accessing the local area network, a Dynamic Host Configuration Protocol (DHCP) server may allocate an IP address to the WiFi terminal. The IP address may be used as the communication address between the WiFi terminal and the local area network.
Step 202: The WiFi terminal executes the login process. In this process, the WiFi terminal sends an access request to the authentication serving gateway. For example, the WiFi terminal opens the browser and enters any Internet address to connect to the Internet. After receiving the access request, the authentication serving gateway redirects the request (the redirection may be routing redirection). That is, the authentication serving gateway changes the accessed Internet address to the authentication page address of a portal/policy server, where the portal/policy server may be a portal server or a policy server. The portal/policy server feeds back an authentication login page to the WiFi terminal. The preceding authentication login page may be a Web portal page.
Step 203: The WiFi terminal receives authentication login information entered on the Web authentication login page, where the authentication login information may be the user name and password, and then sends the authentication login information to the portal/policy server.
Step 204: The portal/policy server sends an access request to the authentication serving gateway.
The portal/policy server may store IDs of various types of user names and corresponding operator information. When receiving the authentication login information from the terminal, the portal/policy server may determine policies such as the access policy, authentication policy, and charging policy of the terminal. The access policy may be carried in the preceding access request that the portal/policy server sends to the authentication serving gateway.
Step 205: The authentication serving gateway determines a target network that the terminal needs to authenticate or charge according to the access request. In the preceding determine process, the condition for determining a target network that the terminal needs to authenticate or charge may be obtained from an HSS.
The authentication serving gateway converts the user authentication login information into a standard access request that meets the format of the target network. The standard access request may be converted according to the format of the target network transmission protocol.
Step 206: The authentication serving gateway sends the converted standard user access request to the target network to start the user access authentication process. After the target network is authenticated, the authentication serving gateway receives an authentication result from the target network.
Step 207: The authentication serving gateway sends the authentication result to the portal/policy server. If the authentication succeeds, the portal/policy server may send the service policy information of the user to the authentication serving gateway. The service policy may include information such as types of services that the user subscribes to. The portal/policy server may also send the access policy of the WiFi terminal to the authentication serving gateway and the WiFi terminal. If the WiFi and a Global System for Mobile Communications (GSM) are available at the same time, the terminal may select a proper access mode. For example, it uses the WiFi first to establish voice communication services, thus saving toll fees.
In addition, the user may send a change request for changing the required service or a query request for querying for the services subscribed by the user to the portal/policy server on the Web portal page. Then, the portal/policy server may send the service information subscribed by the user to the WiFi terminal according to the query request or change the services subscribed to by the user according to the change request.
Step 208: The WiFi terminal accepts communications of normal services. In this process, the terminal may always interact with the target network through the authentication serving gateway, and the authentication serving gateway may collect the user service information.
Step 209: The authentication serving gateway monitors whether the terminal logs out. For example, the monitoring method may be: The authentication serving gateway monitors whether the heartbeat times out (it may periodically check whether the data link is still in the activated state; if no response is made after the preset time ends, the heartbeat times out.) or whether a logout request is received from the WiFi terminal; if it is detected that the heartbeat times out or a logout message is received from the terminal, the process goes to step 211.
Step 210: The authentication serving gateway sends the obtained charging information to the target network. The target network may charge the WiFi terminal according to the obtained charging information, and send the obtained charging information to the local charging system and the home charging system of the user. The local operator network and home operator network allocate fees and benefits according to a protocol. If the charging information is customized by the BOSS, the authentication serving gateway may send the obtained charging information to the BOSS.
Step 211: The authentication serving gateway stops charging and disconnects the Internet (logout process).
In this embodiment, the authentication serving gateway may act as the access control component of the WLAN, and manage the WLAN session access. In this embodiment, the process of sending an authentication page to the terminal by the portal/policy server and returning the login information by the terminal is a user authentication process based on the Web Portal, which may be implemented by using following multiple methods:
First method: A one-time login password is used. The user enters a mobile phone number on the Web portal authentication page, and sends the mobile phone number to the portal server. The portal server feeds back a one-time login password through short messages. After the user obtains the password, the user enters the password on the Web portal authentication page for authentication. This method has the following merit: When the user needs network services, the portal server sends a one-time password; this method features high security and is of a post-paid type.
Second method: The terminal subscribes to and registers with the operator network before accessing the network, and deposits money in the terminal account. This method is of a prepaid type.
Third Embodiment
As shown in FIG. 3, an authentication serving gateway provided in this embodiment includes:
a request receiving unit 301, adapted to receive an access request from a terminal or a portal/policy server;
a target network determining unit 302, adapted to determine a target network that the terminal needs to access according to the access request;
a request converting unit 303, adapted to convert the access request according to the format of the target network transmission protocol;
a request sending unit 304, adapted to send the converted access request to the target network;
an authentication result receiving unit 305, adapted to receive the authentication result sent from the target network; and
an authentication result sending unit 306, adapted to send the authentication result to the terminal.
Further, the request sending unit 304 is further adapted to send the access request from the terminal received by the request receiving unit 301 to the portal/policy server.
As shown in FIG. 4, the preceding authentication serving gateway may further include:
a login page sending unit 401, adapted to send the authentication login page from the portal/policy server to the terminal;
a login information sending unit 402, adapted to send the authentication login information from the terminal to the portal/policy server;
Optionally, the request receiving unit 301, adapted to receive an access request from the portal/policy server, where the access request carries an access policy; and
the target network determining unit 302, adapted to determine a target network that the terminal needs to access according to the access policy carried in the access request sent from the portal/policy server.
Optionally, the preceding authentication result sending unit 306 is further adapted to send the authentication result to the portal/policy server.
As shown in FIG. 5, the preceding authentication serving gateway may further include:
a service policy receiving unit 501, adapted to receive the service policy information from the portal/policy server after the authentication result sending unit 306 sends the authentication result to the portal/policy server;
a charging information obtaining unit 502, adapted to obtain charging information according to the user service information collected base on the service policy information; and
a charging information sending unit 503, adapted to send the charging information obtained by the charging information obtaining unit 502 to at least one of the following: the BOSS, the target network, and the local charging system.
As shown in FIG. 6, the preceding authentication serving gateway may further include:
a service policy sending unit 601, adapted to send the service policy information to the terminal.
As shown in FIG. 7, the preceding authentication serving gateway may further include:
a logout monitoring unit 701, adapted to: monitor whether the heartbeat times out and whether a logout message is received from the terminal; and
an obtaining and connection controlling unit 702, adapted to: stop obtaining the charging information and disconnect the network if the heartbeat times out or a logout message is received from the terminal.
In this embodiment, the target network that the terminal needs to access is determined according to the access request sent from the WLAN terminal; and an access request that complies with the format of the target network transmission protocol is sent to the target network, so that the WLAN terminal accesses multiple data networks.
The policies for accessing heterogeneous networks are uniformly managed by the portal/policy server. In this way, the authentication serving gateway may be simplified and the heterogeneous network information may be managed clearly.
In addition, the unified authentication or unified charging of the WLAN and multiple networks may promote the convergence of these networks.
In the preceding implementation method, the user is informed of the terminal service policy information, which reflects the user's right to know the truth and lays a foundation for changing the service policy. If it is detected that the heartbeat times out, the terminal that is connected but is idle may be disconnected, thus saving access resources.
Fourth Embodiment
As shown in FIG. 8, the portal/policy server provided in this embodiment includes:
an access request receiving unit 801, adapted to receive an access request from the terminal;
a login page sending unit 802, adapted to send an authentication login page after receiving the access request;
a login information receiving unit 803, adapted to receive the authentication login information; and
an access request sending unit 804, adapted to: determine an access policy according to the authentication login information, and send an access request that carries the access policy to the authentication serving gateway.
As shown in FIG. 9, the preceding portal/policy server may further include:
an authentication result receiving unit 901, adapted to receive the authentication result from the authentication serving gateway; and
a service policy sending unit 902, adapted to send the service policy information corresponding to the authentication result to the authentication serving gateway.
The policies for accessing heterogeneous networks are uniformly managed by using the portal/policy server. In this way, the authentication serving gateway may be simplified and the heterogeneous network information may be managed clearly.
Fifth Embodiment
As shown in FIG. 10, the system for accessing heterogeneous networks via the WLAN in this embodiment includes an authentication serving gateway 1001, a target network 1002, and a terminal 1003 that are mutually connected.
The authentication serving gateway 1001 is adapted to: receive an access request from the terminal 1003; determine the target network 1002 that the terminal 1003 needs to access according to the access request; convert the access request according to the format of the transmission protocol required by the target network 1002; send the converted access request to the target network 1002; receive an authentication result from the target network 1002, and send the authentication result to the terminal 1003.
Optionally, as shown in FIG. 11, the system may further include a portal/policy server 1101.
The authentication serving gateway 1001 is further adapted to receive the access request from the portal/policy server 1101. After receiving the access request from the portal/policy server 1101, the authentication serving gateway 1001 is further adapted to: send the access request from the terminal to the portal/policy server 1101; send the authentication login page from the portal/policy server to the terminal 1003; send the authentication login information from the terminal 1003 to the portal/policy server 1101; receive an access request that carries the access policy from the portal/policy server 1101; and determine the target network 1002 that the terminal 1003 needs to access according to the access policy in the access request from the portal/policy server 1101.
The portal/policy server 1101 is adapted to: receive an access request from the terminal 1003; send the authentication login page to the authentication serving gateway 1001 after receiving the access request; receive the authentication login information, determine the access policy according to the authentication login information, and send an access request that carries the access policy to the authentication serving gateway 1001.
Further, the preceding authentication serving gateway is further adapted to send the preceding authentication result to the portal/policy server 1101; receive the service policy information from the portal/policy server 1101; and obtain the charging information according to the user service information collected base on the service policy information, and send the charging information to at least one of the following: the BOSS, the target network 1002, and the local charging system.
The portal/policy server 1101 is further adapted to: receive the authentication result from the authentication serving gateway 1001, and send the service policy information corresponding to the authentication result to the authentication serving gateway 1001.
In this embodiment, the target network that the terminal needs to access is determined according to the access request sent from the WLAN terminal; and an access request that complies with the format of the target network transmission protocol is sent to the target network, so that the WLAN terminal accesses multiple data networks.
The policies for accessing heterogeneous networks are managed by using the portal/policy server. In this way, the authentication serving gateway may be simplified and the heterogeneous network information may be managed clearly.
In addition, the unified authentication or unified charging of the WLAN and multiple networks may promote the convergence of these networks.
Those skilled in the art may understand that all or part of the steps in the preceding embodiments may be performed by a program instructing relevant hardware. The program may be stored in a computer readable storage medium such as a Random-Access Memory (RAM), a memory, a Read-Only Memory (ROM), an Electrically-Programmable Read-Only Memory (EPROM), an Electrically-Erasable Programmable Read-Only Memory (EEPROM), a register, a hard disk, a removable disk, a Compact Disc-Read Only Memory (CD-ROM), or a storage medium of any forms well-known to persons skilled in the art.
Detailed above are a method, an apparatus, and a system for accessing heterogeneous networks via the WLAN under the present invention. Although the invention is described through several exemplary embodiments, the invention is not limited to such embodiments. It is apparent that those skilled in the art can make various modifications and variations to the invention without departing from the spirit and scope of the invention. The invention shall cover the modifications and variations provided that they fall within the scope of protection defined by the following claims or their equivalents.

Claims (18)

What is claimed is:
1. A method for accessing a heterogeneous network via a Wireless Local Area Network (WLAN), the method comprising:
receiving, by an authentication serving gateway, an access request from a server, wherein the access request includes information relating to a target network that a terminal needs to access via the WLAN, wherein the heterogeneous network is the target network;
determining, by the authentication serving gateway, the target network that the terminal needs to access according to the access request from the server, wherein a transmission protocol of the target network is different from that of the WLAN;
converting, by the authentication serving gateway, the access request according to the transmission protocol of the target network;
sending, by the authentication serving gateway, the converted access request to the target network;
receiving, by the authentication serving gateway, an authentication result from the target network; and
sending, by the authentication serving gateway, the authentication result to the server;
wherein the access request from the server carries an access policy; and
wherein the determining the target network that the terminal needs to access comprises determining the target network that the terminal needs to access according to the access policy in the access request.
2. The method of claim 1, wherein the method further comprises:
receiving, by the authentication serving gateway, service policy information from the server;
obtaining, by the authentication serving gateway, charging information according to user service information collected based on the service policy information; and
sending, by the authentication serving gateway, the charging information to at least one of a Business Operation Support System (BOSS), the target network, and a local charging system.
3. The method of claim 2, wherein the method further comprises:
sending, by the authentication serving gateway, the service policy information to the terminal.
4. The method of claim 2, wherein the method further comprises:
monitoring, by the authentication serving gateway, whether a heartbeat times out or whether a logout message is received from the terminal; and
if the heartbeat times out or the logout message is received from the terminal, stopping obtaining further charging information and disconnecting the target network.
5. An authentication serving gateway, comprising:
a request receiving unit, adapted to receive an access request from a server, wherein the access request includes information relating to a target network that a terminal needs to access via a Wireless Local Area Network (WLAN);
a target network determining unit, adapted to determine the target network that the terminal needs to access according to the access request from the server, wherein a transmission protocol of the target network is different from that of the WLAN;
a request converting unit, adapted to convert the access request according to the transmission protocol of the target network;
a request sending unit, adapted to send the converted access request to the target network;
an authentication result receiving unit, adapted to receive an authentication result from the target network; and
an authentication result sending unit, adapted to send the authentication result to the server;
wherein the access request from the server carries an access policy from the server; and
wherein the target network determining unit is adapted to determine the target network that the terminal needs to access according to the access policy in the access request.
6. The authentication serving gateway of claim 5, wherein the authentication serving gateway further comprises:
a service policy receiving unit, adapted to receive service policy information from the server after the authentication result sending unit sends the authentication result to the server;
a charging information obtaining unit, adapted to obtain charging information according to user service information collected based on the service policy information; and
a charging information sending unit, adapted to send the charging information obtained by the charging information obtaining unit to at least one of a Business Operation Support System (BOSS), the target network, and a local charging system.
7. The authentication serving gateway of claim 6, further comprising:
a service policy sending unit, adapted to send the service policy information to the terminal.
8. The authentication serving gateway of claim 7, further comprising:
a logout monitoring unit, adapted to monitor whether a heartbeat times out or whether a logout message is received from the terminal; and
an obtaining and connection controlling unit, adapted to stop obtaining further charging information and disconnect the target network if the heartbeat times out or the logout message is received from the terminal.
9. A server, comprising:
an access request receiving unit, adapted to receive an access request from a terminal;
a login page sending unit, adapted to send an authentication login page to the terminal when the access request is received from the terminal;
a login information receiving unit, adapted to receive authentication login information from the terminal;
an access request sending unit, adapted to determine an access policy according to the authentication login information and send a second access request that comprises the access policy to an authentication serving gateway to determine a target network that the terminal needs to access via a Wireless Local Area Network (WLAN); and
an authentication result receiving unit, adapted to receive an authentication result from the authentication serving gateway;
wherein a transmission protocol of the target network is different from that of the WLAN; and
wherein the server comprises a policy server or a portal server.
10. The server of claim 9, further comprising:
a service policy sending unit, adapted to send service policy information corresponding to the authentication result to the authentication serving gateway.
11. The method of claim 1, the method further comprising sending, by the authentication serving gateway, the authentication result to the terminal.
12. The method of claim 1, the method further comprising:
sending, by the authentication serving gateway, a second access request from the terminal to the server;
sending, by the authentication serving gateway, an authentication login page from the server to the terminal; and
sending, by the authentication serving gateway, authentication login information from the terminal to the server to perform authentication of the terminal.
13. The method of claim 1, wherein the server comprises a portal server.
14. The method of claim 1, wherein the server comprises a policy server.
15. The authentication serving gateway of claim 5, further comprising an authentication result sending unit, adapted to send the authentication result to the terminal.
16. The authentication serving gateway of claim 5, further comprising:
a login page sending unit, adapted to send an authentication login page from the server to the terminal; and
a login information sending unit, adapted to send authentication login information from the terminal to the server to perform authentication of the terminal.
17. The authentication serving gateway of claim 5, wherein the server includes a portal server.
18. The authentication serving gateway of claim 5, wherein the server includes a policy server.
US12/730,903 2009-03-24 2010-03-24 Method and apparatus for accessing heterogeneous networks via wireless local area network Active 2032-02-15 US9100384B2 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CN200910119377 2009-03-24
CN200910119377.8A CN101516126B (en) 2009-03-24 2009-03-24 Method and device for accessing wireless local area network into the other network
CN200910119377.8 2009-03-24

Publications (2)

Publication Number Publication Date
US20100251331A1 US20100251331A1 (en) 2010-09-30
US9100384B2 true US9100384B2 (en) 2015-08-04

Family

ID=41040357

Family Applications (1)

Application Number Title Priority Date Filing Date
US12/730,903 Active 2032-02-15 US9100384B2 (en) 2009-03-24 2010-03-24 Method and apparatus for accessing heterogeneous networks via wireless local area network

Country Status (2)

Country Link
US (1) US9100384B2 (en)
CN (1) CN101516126B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10517021B2 (en) 2016-06-30 2019-12-24 Evolve Cellular Inc. Long term evolution-primary WiFi (LTE-PW)

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101516126B (en) 2009-03-24 2011-04-13 华为技术有限公司 Method and device for accessing wireless local area network into the other network
CN102026194B (en) * 2009-09-14 2013-08-28 华为技术有限公司 Method, equipment and system for converging WiFi (Wireless Fidelity) network and WiMAX (Wireless Metropolitan Area Networking) network
CN102868665B (en) * 2011-07-05 2016-07-27 华为软件技术有限公司 The method of data transmission and device
CN103200561A (en) * 2012-01-06 2013-07-10 苏州欧姆尼克新能源科技有限公司 Scheme for inputting user name and password when Wifi-based electrical equipment in new energy field is accessed to Wifi network
CN104094618B (en) * 2013-01-29 2018-09-28 华为技术有限公司 Access control method, apparatus and system
CN103369715A (en) * 2013-07-03 2013-10-23 福建富士通信息软件有限公司 WIFI (Wireless Fidelity) e-Touch implementing method for mobile terminal
CN103414927A (en) * 2013-08-14 2013-11-27 天脉聚源(北京)传媒科技有限公司 Multimedia device
CN104426660A (en) * 2013-09-04 2015-03-18 中兴通讯股份有限公司 Portal authentication method, BNG (broadband network gateway), Portal server and Portal authentication system
CN103763102B (en) * 2013-12-31 2018-09-28 上海斐讯数据通信技术有限公司 A kind of wifi safety management systems and management method based on message push
CN103945380A (en) * 2014-04-10 2014-07-23 深圳市信锐网科技术有限公司 Method and system for network login authentication based on graphic code
JP5959070B2 (en) * 2014-07-30 2016-08-02 インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation Information processing apparatus, terminal, program and method
CN106304057A (en) * 2015-05-20 2017-01-04 上海纳鑫信息科技有限公司 A kind of general WIFI authentication method and system
CN106304073A (en) * 2016-08-30 2017-01-04 福建富士通信息软件有限公司 A kind of authentication management method and system of WIFI Portal
CN107197462B (en) 2017-06-28 2020-04-07 阿里巴巴集团控股有限公司 Wireless network type detection method and device and electronic equipment
WO2019199282A1 (en) * 2018-04-10 2019-10-17 Visa International Service Association Deep link authentication

Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020065109A1 (en) * 2000-11-29 2002-05-30 Tapio Mansikkaniemi Wireless terminal device with user interaction system
US20020103666A1 (en) * 2001-01-29 2002-08-01 Atsushi Hanai Server device, method for supporting sales performance, recording medium and data signal embodied in a carrier wave
US20020110104A1 (en) * 2001-02-13 2002-08-15 Telefonaktiebolaget Lm Ericsson (Publ). Hybrid media gateway control function providing circuit-switched access to a packet-switched radio telecommunications network
US20030051041A1 (en) * 2001-08-07 2003-03-13 Tatara Systems, Inc. Method and apparatus for integrating billing and authentication functions in local area and wide area wireless data networks
US20030182431A1 (en) * 1999-06-11 2003-09-25 Emil Sturniolo Method and apparatus for providing secure connectivity in mobile and other intermittent computing environments
US20050080884A1 (en) * 2002-01-29 2005-04-14 David Siorpaes Method and system for connecting mobile client devices to the internet
WO2005051026A1 (en) * 2003-11-12 2005-06-02 Matsushita Electric Industrial Co., Ltd Contex transfer in a communication network comprising plural heterogeneous access networks
US20060077951A1 (en) 2004-10-13 2006-04-13 Godas Eric J Method and system for redirecting networked traffic
US20070004393A1 (en) * 2005-06-29 2007-01-04 Nokia Corporation System and method for automatic application profile and policy creation
WO2007039453A1 (en) 2005-10-05 2007-04-12 International Business Machines Corporation System and method for performing a trust-preserving migration of data objects from a source to a target
US20080072053A1 (en) * 2006-09-15 2008-03-20 Halim Budi S Web-based authentication system and method
CN101374138A (en) 2007-08-21 2009-02-25 华为技术有限公司 Method for requesting business modification in SIP protocol, network system and apparatus
US20090089866A1 (en) * 2007-09-27 2009-04-02 Akifumi Yato Access authorization system, access control server, and business process execution system
US7565326B2 (en) * 2000-05-25 2009-07-21 Randle William M Dialect independent multi-dimensional integrator using a normalized language platform and secure controlled access
CN101516126A (en) 2009-03-24 2009-08-26 华为技术有限公司 Method and device for accessing wireless local area network into the other network
US8108921B2 (en) * 2004-06-10 2012-01-31 Samsung Electronics Co., Ltd. Single-sign-on method based on markup language and system using the method
US8151322B2 (en) * 2006-05-16 2012-04-03 A10 Networks, Inc. Systems and methods for user access authentication based on network access point
US8731194B2 (en) * 2007-10-18 2014-05-20 Lg Electronics Inc. Method of establishing security association in inter-rat handover

Patent Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030182431A1 (en) * 1999-06-11 2003-09-25 Emil Sturniolo Method and apparatus for providing secure connectivity in mobile and other intermittent computing environments
US7565326B2 (en) * 2000-05-25 2009-07-21 Randle William M Dialect independent multi-dimensional integrator using a normalized language platform and secure controlled access
US20020065109A1 (en) * 2000-11-29 2002-05-30 Tapio Mansikkaniemi Wireless terminal device with user interaction system
US20020103666A1 (en) * 2001-01-29 2002-08-01 Atsushi Hanai Server device, method for supporting sales performance, recording medium and data signal embodied in a carrier wave
US20020110104A1 (en) * 2001-02-13 2002-08-15 Telefonaktiebolaget Lm Ericsson (Publ). Hybrid media gateway control function providing circuit-switched access to a packet-switched radio telecommunications network
US20030051041A1 (en) * 2001-08-07 2003-03-13 Tatara Systems, Inc. Method and apparatus for integrating billing and authentication functions in local area and wide area wireless data networks
US20050080884A1 (en) * 2002-01-29 2005-04-14 David Siorpaes Method and system for connecting mobile client devices to the internet
WO2005051026A1 (en) * 2003-11-12 2005-06-02 Matsushita Electric Industrial Co., Ltd Contex transfer in a communication network comprising plural heterogeneous access networks
US8108921B2 (en) * 2004-06-10 2012-01-31 Samsung Electronics Co., Ltd. Single-sign-on method based on markup language and system using the method
US20060077951A1 (en) 2004-10-13 2006-04-13 Godas Eric J Method and system for redirecting networked traffic
US20070004393A1 (en) * 2005-06-29 2007-01-04 Nokia Corporation System and method for automatic application profile and policy creation
WO2007039453A1 (en) 2005-10-05 2007-04-12 International Business Machines Corporation System and method for performing a trust-preserving migration of data objects from a source to a target
US8151322B2 (en) * 2006-05-16 2012-04-03 A10 Networks, Inc. Systems and methods for user access authentication based on network access point
US20080072053A1 (en) * 2006-09-15 2008-03-20 Halim Budi S Web-based authentication system and method
CN101374138A (en) 2007-08-21 2009-02-25 华为技术有限公司 Method for requesting business modification in SIP protocol, network system and apparatus
US20090089866A1 (en) * 2007-09-27 2009-04-02 Akifumi Yato Access authorization system, access control server, and business process execution system
US8731194B2 (en) * 2007-10-18 2014-05-20 Lg Electronics Inc. Method of establishing security association in inter-rat handover
CN101516126A (en) 2009-03-24 2009-08-26 华为技术有限公司 Method and device for accessing wireless local area network into the other network
US20100251331A1 (en) 2009-03-24 2010-09-30 Huawei Technologies Co., Ltd. Method and Apparatus for Accessing Heterogeneous Networks via Wireless Local Area Network

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
04305537.pdf, Minghui Shi et al. A Service-Agent-Based Roaming Architecture for WLAN/Cellular Integrated Networks,IEEE Transactions on Vehicular Technology, vol. 56, No. 5, Sep. 2007; pp. 1-14 as printed. *
Mostafa, How proxy server servers FTP client? 2005, p. 2 section Userconnection/authentication and Figure 3. http://www.codeproject.com/Articles/9547/How-Proxy-Server-serves-FTP-clients. *
Translation of Chinese Office Action, First office Action of the State Intellectual Property Office of the PRC, Application No. 200910119377.8, Mar. 10, 2010, 8 pages.
wlan-msc.pdf, Juan Caballero et al. Experimental Study of a Network Access Server for a public WLAN access network, Royal Institute of Techology, KTH, Stockholm, 2002; pp. 1-122 as printed. *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10517021B2 (en) 2016-06-30 2019-12-24 Evolve Cellular Inc. Long term evolution-primary WiFi (LTE-PW)
US11382008B2 (en) 2016-06-30 2022-07-05 Evolce Cellular Inc. Long term evolution-primary WiFi (LTE-PW)
US11849356B2 (en) 2016-06-30 2023-12-19 Evolve Cellular Inc. Long term evolution-primary WiFi (LTE-PW)

Also Published As

Publication number Publication date
CN101516126A (en) 2009-08-26
CN101516126B (en) 2011-04-13
US20100251331A1 (en) 2010-09-30

Similar Documents

Publication Publication Date Title
US9100384B2 (en) Method and apparatus for accessing heterogeneous networks via wireless local area network
US11019454B2 (en) Apparatus and methods for device location determination
US11470204B2 (en) Manual roaming and data usage rights
EP3020230B1 (en) Network architecture enabling a mobile terminal to roam into a wireless local area network
US7522907B2 (en) Generic wlan architecture
WO2020033334A1 (en) Apparatus and methods for registration and operation in wireless networks
EP3113524B1 (en) Methods and apparatus to support emergency services connectivity requests through untrusted wireless networks
US8891498B2 (en) Method for wireless network re-selection in a plurality of networks environment
WO2015006316A1 (en) Connecting imsi-less devices to the epc
WO2009008627A2 (en) A method of establishing fast security association for handover between heterogeneous radio access networks
CN103517383B (en) A method and a device for the access of a mobile terminal to a household network
US10219309B2 (en) D2D service authorizing method and device and home near field communication server
CN103384365A (en) Method and system for network access, method for processing business and equipment
EP2721859B1 (en) Handling of operator connection offers in a communication network
CN107027112B (en) Authentication system for integrating heterogeneous networks and authentication method thereof
US10003570B2 (en) Method and device for informing user address
GB2602075A (en) Telecommunications network
CN117616818A (en) First core network node, second node and third node for handling execution of actions by a device, communication system and method performed thereby

Legal Events

Date Code Title Description
AS Assignment

Owner name: HUAWEI TECHNOLOGIES CO., LTD., CHINA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:LI, GUODONG;REEL/FRAME:024132/0643

Effective date: 20100322

STCF Information on status: patent grant

Free format text: PATENTED CASE

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 4

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 8